ISSN 2319-2720 Volume 5, No.3, July - September 2016 Ravinder Naik R, et al., International Journal of Computing, Communications and Networking, 5(3), July- September 2015, 1-3
International Journal of Computing, Communications and Networking Available Online at http://www.warse.org/ijccn/static/pdf/file/ijccn01532016.pdf
Cleaning of sensitive data in the cloud using Monitoring as a service Ravinder Naik R 1, P.Ravinder Rao 2, Bandu Madar3 1 Asst.professor, India, ravindernaikcse@cvsr.ac.in 2 Associate Professor, India, ravinderaocse@cvsr.ac.in 3 Asst.professor, India, madarbanducse@cvsr.ac.in efficient storage mechanisms and maintainability issues with large amounts of data storage [11]. In addition to these benefits, customers can easily access their data from any geographical region where the Cloud Service Providers network or Internet can be accessed [12]. An example of the cloud computing is shown in Fig. 1. Since cloud service providers (SP ) are separate market entities, data integrity and privacy and retrieval are the most critical issues that need to be addressed in cloud computing[12]. Even though the cloud service providers have standard regulations and powerful infrastructure to ensure customers data privacy, data retrieval and provide a better availability[11] , the reports of privacy breach and service outage have been apparent in last few years Cloud Computing is a accepted computing model in which cloud providers, offers scalable resources over the internet to customers. Because of its extended benefits cloud computing becomes more and more popular, it has gradually drawn many enterprises attention. Due to the fanatical business competition and stretched budget, enterprises requires to look for probable ways to cut the cost. According to the National Institute of Standards and Technology (NIST), cloud computing providers offer three basic service models[10]: Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)
ABSTRACT In Cloud Computing is leading to a Promising future to address the security issues in the cloud, where data is spread over and connected over a network belonging to various enterprises and data can be migrated from one vendor to the other vendor if the client wishes to the change the cloud provider . Now a day’s cloud infrastructure s are widely used for data storage and processing under storage as a service model, As the data is residing at the remote party gives a chance for the user to suspect the provider whether his data is safe or not and there is a serious threat for data privacy. Once if SLA’s were expired or if sensitive data needs to be migrated from one vendor to the other vendor, the sanitization needs to be taken place here the doubt arises ,how to ensure that the data is completed sanitized at the provider end. Although such we have some mechanisms to carry out such technique but we may not have assurance that sanitization process is done .We introduce a mechanism which will monitor data sanitization process by using Monitoring as a Service with the help of third party service. .Key words : Cloud Computing, Data Sanitization, Monitoring as a Service, Third Party Service INTRODUCTION
Based on the entity requirement and demand enterprises can choose one from the available service models , all of the aforementioned techniques to create computational services to all the stakeholders. From the viewpoint of cloud technology, computing in cloud seems to be capable of giving a chance to infrastructure management in info. Systems and to improve central part of competencies, Still the probable security and privacy issues may hold back the services of the cloud from fast developing. The major security concerns in the cloud computing are Data storage and Computing security issues .The difficulty of outsourcing data for storage and computing responsibilities to a third party is that customers do not know what happens with in the cloud, because customers do not have their data locally .Wang.et.al [1] proposed that storage security is concerned it has always been as important aspect of the Quality of Service. Good actions are needed to competently verify the status of the data in the different scenarios: before or/and after computing and while being persistently stored. However, Ateneise et.al [2] stated that the main question is how often the data need to be checked. The data stored in the storage server or cluster of
The industrial information technology towards a subscription based or pay-per-use service business model known as cloud computing. This paradigm provides users with a long list of advantages, such as provision computing capabilities; broad, heterogeneous network access; resource pooling and rapid elasticity with measured services .Huge amounts of data being retrieved from geographically distributed data sources, and non-localized data-handling requirements, creates such a change in technological as well as business model. One of the prominent services offered in cloud computing is the cloud data storage, in which, subscribers do not have to store their own data on their servers, where instead their data will be stored on the cloud service provider‟s servers. In cloud computing, subscribers have to pay the providers for this storage service. This service does not only provides flexibility and scalability data storage, it also provides customers with the benefit of paying only for the amount of data they needs to store for a particular period of time, without any concerns of
1